This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "PRNG Seed Error"
From OWASP
(→Description) |
(→Examples) |
||
Line 22: | Line 22: | ||
==Examples== | ==Examples== | ||
− | + | TBD | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Related [[Attacks]]== | ==Related [[Attacks]]== |
Revision as of 13:40, 27 February 2009
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Last revision (mm/dd/yy): 02/27/2009
Vulnerabilities Table of Contents
Description
The incorrect use of a seed by a Psuedo Random Number Generator. A seed error is usually brought on through the erroneous generation or application of a seed state.
Risk Factors
TBD
Examples
TBD
Related Attacks
The application of a seed state that is known to an attacker can lead to a permanent compromise attack [1].
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: